Constantinos Kolias

Orcid: 0000-0002-3020-291X

According to our database1, Constantinos Kolias authored at least 39 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Towards Scalable EM-based Anomaly Detection For Embedded Devices Through Synthetic Fingerprinting.
CoRR, 2023

Do Programs Dream of Electromagnetic Signals? Towards GAN-based Code-to-Signal Synthesis.
Proceedings of the IEEE Military Communications Conference, 2023

2022
Best of Both Worlds: Detecting Application Layer Attacks through 802.11 and Non-802.11 Features.
Sensors, 2022

Your WAP Is at Risk: A Vulnerability Analysis on Wireless Access Point Web-Based Management Interfaces.
Secur. Commun. Networks, 2022

How is your Wi-Fi connection today? DoS attacks on WPA3-SAE.
J. Inf. Secur. Appl., 2022

Detecting Code Injections in Noisy Environments Through EM Signal Analysis and SVD Denoising.
CoRR, 2022

Pick Quality Over Quantity: Expert Feature Selection and Data Preprocessing for 802.11 Intrusion Detection Systems.
IEEE Access, 2022

2021
Vulnerabilities and Attacks Against Industrial Control Systems and Critical Infrastructures.
CoRR, 2021

WiF0: All Your Passphrase Are Belong to Us.
Computer, 2021

Industrial and Critical Infrastructure Security: Technical Analysis of Real-Life Security Incidents.
IEEE Access, 2021

Empirical Evaluation of Attacks Against IEEE 802.11 Enterprise Networks: The AWID3 Dataset.
IEEE Access, 2021

Black-Box IoT: Authentication and Distributed Storage of IoT Data from Constrained Sensors.
Proceedings of the IoTDI '21: International Conference on Internet-of-Things Design and Implementation, 2021

2020
A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks.
Symmetry, 2020

EM Fingerprints: Towards Identifying Unauthorized Hardware Substitutions in the Supply Chain Jungle.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

2019
Security, Privacy, and Trust on Internet of Things.
Wirel. Commun. Mob. Comput., 2019

2018
Cybertrust in the IoT Age.
Computer, 2018

2017
TermID: a distributed swarm intelligence-based approach for wireless intrusion detection.
Int. J. Inf. Sec., 2017

Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset.
Future Internet, 2017

DDoS in the IoT: Mirai and Other Botnets.
Computer, 2017

The Mirai botnet and the IoT Zombie Armies.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Breaking BLE Beacons For Fun But Mostly Profit.
Proceedings of the 10th European Workshop on Systems Security, 2017

2016
Learning Internet-of-Things Security "Hands-On".
IEEE Secur. Priv., 2016

Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset.
IEEE Commun. Surv. Tutorials, 2016

On the Move: Evading Distributed Denial-of-Service Attacks.
Computer, 2016

2015
Securely Making "Things" Right.
Computer, 2015

Battling Against DDoS in SIP - Is Machine Learning-based Detection an Effective Weapon?.
Proceedings of the SECRYPT 2015, 2015

2014
Intrusion detection in wireless networks using nature inspired algorithms
PhD thesis, 2014

RuleMR: Classification rule discovery with MapReduce.
Proceedings of the 2014 IEEE International Conference on Big Data (IEEE BigData 2014), 2014

2013
A Client-Side Privacy Framework for Web Personalization.
Proceedings of the Semantic Hyper/Multimedia Adaptation - Schemes and Applications, 2013

Attacks and Countermeasures on 802.16: Analysis and Assessment.
IEEE Commun. Surv. Tutorials, 2013

2011
Swarm intelligence in intrusion detection: A survey.
Comput. Secur., 2011

DoS attacks exploiting signaling in UMTS and IMS.
Comput. Commun., 2011

2010
Design and implementation of a VoiceXML-driven wiki application for assistive environments on the web.
Pers. Ubiquitous Comput., 2010

2009
Signaling-Oriented DoS Attacks in UMTS Networks.
Proceedings of the Advances in Information Security and Assurance, 2009

A secure and efficient authentication protocol for passive RFID tags.
Proceedings of the 2009 6th International Symposium on Wireless Communication Systems, 2009

2008
Enabling the provision of secure web based m-health services utilizing XML based security models.
Secur. Commun. Networks, 2008

Enhancing User Privacy in Adaptive Web Sites with Client-Side User Profiles.
Proceedings of the Third International Workshop on Semantic Media Adaptation and Personalization, 2008

A Speech-Enabled Assistive Collaborative Platform for Educational Purposes with User Personalization.
Proceedings of the Third International Workshop on Semantic Media Adaptation and Personalization, 2008

A pervasive wiki application based on VoiceXML.
Proceedings of the 1st ACM International Conference on Pervasive Technologies Related to Assistive Environments, 2008


  Loading...